[web]
Shuo Wang
/ 2011
/ Biometrics on Mobile Phone
/ www.intechopen.com/articles/show/title/biometrics-on-mobile-phone
[journal]
Tseng, D.
/ 2010
/ Lensfree Microscopy on a Cellphone
/ Lab on a Chip
10
(14)
: 1782~1792
[confproc]
M. Gordon
/ 2011
/ Biometric Security Mechanism in Mobile Payments
/ Proc., of the 5th National Conference; INDIACom-2011, Computing For Nation Development
[confproc]
Bao, X
/ 2009
/ Method of Individual Identification based on Electroencephalogram Analysis
/ Proc., of 2009 International Conference on New Trends in Information and Service Science
: 390~393
[confproc]
Nakanishi, I
/ 2009
/ EEG Based Biometric Authentication Using New Spectral Features
/ Proc., of 2009 International Symposium on Intelligent Signal Processing and Communication Systems
: 651~654
[web]
/ http://www.biometry.com/mobicombiom.html
/ http://www.biometry.com/mobicombiom.html
[web]
/ http://www.voicevault.com/voicevault-enterprise/voice auth/
/ http://www.voicevault.com/voicevault-enterprise/voiceauth/
[web]
/ http://www.huffingtonpost.com/2011/10/19/faceunlock- ice-cream-sandwich_n_1020207.html
/ http://www.huffingtonpost.com/2011/10/19/faceunlock-ice-cream-sandwich_n_1020207.html
[journal]
Daugman, J
/ 2004
/ How Iris Recognition Works
/ IEEE Transactions on Circuits and Systems for Video Technology
14
(1)
: 21~30
[journal]
차병래
/ 2011
/
Availability Verification of Integration OTP Framework using Biometrics Information
/ 한국항행학회논문지
/ 한국항행학회
15
(1)
: 39~53
[journal]
Yun Su Chung
/ 2008
/ Biometric Authentication Framework based on One-Time Template
/ Journal of KIISC
18
(4)
: 61~65
[journal]
신용녀
/ 2011
/
Operational Management for Biometrics Hardware Security Module and PKI
/ 한국정보기술학회논문지
/ 한국정보기술학회
9
(5)
: 207~216
[book]
Wenbo Mao
/ 2003
/ Modern Cryptography : Theory and Practice
/ Prentice Hall
[journal]
한승진
/ 2011
/
A Robust Pair-wise Key Agreement Scheme based on Multi-hop Clustering Sensor Network Environments
/ 한국컴퓨터정보학회논문지
/ 한국컴퓨터정보학회
16
(3)
: 251~260
[confproc]
Jian Wang
/ 2009
/ Secure Authentication and Authorization Scheme for Mobile Devices
/ Proceedings of ICCTA2009
[confproc]
Josyula R. Rao
/ 2002
/ Partitioning Attacks : Or How to Rapidly Clone Some GSM Cards
/ Proceedings of the 2002 IEEE Symposium on Security and Privacy
[confproc]
Y. Zheng
/ 2005
/ AKA and Authtentication Scheme for 4G Mobile Networks Based on Trusted Mobile Platform
/ ICICS 2005
: 976~980
[other]
/ 2003
/ 3GPP TS 24.002, Release 4. GSM-UMTS public land mobile network access reference configuration